Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,220,486 papers from all fields of science
Search
Sign In
Create Free Account
Client certificate
Known as:
Browser certificate
In cryptography, a client certificate is a type of digital certificate that is used by client systems to make authenticated requests to a remote…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
Client (computing)
Digest access authentication
HTTP 403
HTTPS
Expand
Broader (3)
Computer security
Key management
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Website Identity Notification: Testing the Simplest Thing That Could Possibly Work
Milica Stojmenovic
,
Eric Spero
,
Temitayo Oyelowo
,
R. Biddle
Conference on Privacy, Security and Trust
2019
Corpus ID: 209900348
Users are used to authenticating themselves to websites, but not for websites to authenticate to them. One readily available…
Expand
2019
2019
An Omission-Tolerant Cryptographic Checksum
F. Corella
,
K. Lewison
IACR Cryptology ePrint Archive
2019
Corpus ID: 75135668
A cryptographic checksum is a small data item that is computed from a data structure and can be used to prevent undetected…
Expand
2017
2017
Authentication and Access Control for Open Messaging Interface Standard
Narges Yousefnezhad
,
R. Filippov
,
Asad Javed
,
A. Buda
,
Manik Madhikermi
,
Kary Främling
International Conference on Mobile and Ubiquitous…
2017
Corpus ID: 51925933
The number of Internet of Things (IoT) vendors is rapidly growing, providing solutions for all levels of the IoT stack. Despite…
Expand
2015
2015
Kerberos Protocol Transition support using the F 5 BIG-IP Local Traffic Manager TM ( LTM ) with the F 5 Advanced Client Authentication ( ACA ) module . Constrained Delegation Model
2015
Corpus ID: 96423782
2012
2012
User-based authentication for wireless home networks
Stéphane Onno
,
Raphael Gelloz
,
Olivier Heen
,
C. Neumann
International Conference on Consumer Electronics…
2012
Corpus ID: 3836585
Most wireless home networks apply a shared key authentication model to authenticate devices. This results in security weaknesses…
Expand
2009
2009
Improving WTLS Security for WAP Based Mobile e-Commerce
Y. He
,
Moon-Chuen Lee
Wireless personal communications
2009
Corpus ID: 13542565
In recent years, WAP has been gaining increasing popularity as a platform for mobile e-commerce; its security has thus become an…
Expand
2007
2007
Client certificate and IP address based multi-factor authentication for J2EE web applications
Hee-Hwan Park
,
Stan Redford
Conference of the Centre for Advanced Studies on…
2007
Corpus ID: 5164617
Secure and encrypted authentication is an important aspect of J2EE web application security. SSL client certificate…
Expand
2005
2005
A security structure in distributed systems
Ali Chodari Khosroshahi
,
Godrat Abolhasani Sahlan
,
A. Haghighat
International Conference on Software Engineering
2005
Corpus ID: 56264475
Security is a very important aspect of any computing systems, and has become a serious problem since companies and their…
Expand
2004
2004
ACCESSING SERVICES WITH CLIENT DIGITAL CERTIFICATES: A SHORT REPORT FROM THE DCOCE PROJECT
Mark Norman
2004
Corpus ID: 62197828
This article explores the advantages and disadvantages of end user/client digital certificates as means of online authentication…
Expand
1996
1996
Token-mediated certification and electronic commerce
Daniel E. Geer
,
Donald T. Davis
1996
Corpus ID: 166796856
Public key technology presumes the availability of certificates and certifying authorities (CAs) living within a shallow…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE